Block Cipher Security Evaluation Based on Fuzzy Logic

被引:0
|
作者
Mohammed, Sirwan A. [1 ]
Sadkhan, Sattar B. [2 ]
机构
[1] Univ Sulaimani, Dept Elect Engn, Sulaymaniyah, Iraq
[2] Univ Babylon, IEEE IRAQ Sect, Hillah, Iraq
关键词
Block Cipher; RC5; algorithm; Blowfish algorithm; DES algorithm; Fuzzy Logic;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
The main goal of this paper is to present of security evaluation of block cipher use in wireless network. Information security contributes directly to increase level of trust between users by providing an assurance of confidentiality, integrity, and availability of sensitive information of the network. In this paper, evaluations analysis of RC5, Blowfish and DES block cipher algorithms have been done on the basis of block size, numbers of round, and key size of evaluation modeling based on fuzzy logic tool of MA TLAB 2012a. Three metrics are considered for using crypto algorithms for wireless network security. These three algorithms have a variable block size, number of rounds and a variable key size in their structure. Performances of RC5, Blowfish and DES algorithms have been evaluated on variables range of metrics of key size, number of rounds, and block size in this paper. Presents the results of evaluation for security level of crypto have shown the security level depending on the structure of algorithm.
引用
收藏
页码:169 / 173
页数:5
相关论文
共 50 条
  • [1] A fuzzy-based randomness evaluation model for block cipher
    Fan, Limin
    Feng, Dengguo
    Zhou, Yongbin
    [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2008, 45 (12): : 2095 - 2101
  • [2] Fuzzy Logic based security trust evaluation for IoT environments
    Khalil, Ahmad
    Mbarek, Nader
    Togni, Olivier
    [J]. 2019 IEEE/ACS 16TH INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS (AICCSA 2019), 2019,
  • [3] Secure Gamma Generation For Stream Cipher based on Fuzzy Logic
    Alnajjar, Khaled
    Anikin, Igor
    [J]. 2020 VI INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND NANOTECHNOLOGY (IEEE ITNT-2020), 2020,
  • [4] Fuzzy Logic based Decision Support System for Component Security Evaluation
    Nazir, Shah
    Shahzad, Sara
    Mahfooz, Saeed
    Nazir, Muhammad
    [J]. INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2018, 15 (02) : 224 - 231
  • [5] Security Analysis of Block Cipher LED
    Jeong, Kitae
    Yeo, Sang-Soo
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2013, 14 (02): : 281 - 287
  • [6] Decorrelation: A Theory for Block Cipher Security
    Serge Vaudenay
    [J]. Journal of Cryptology, 2003, 16 : 249 - 286
  • [7] Security analysis of block cipher BEAR
    Zhu, HF
    Qu, HB
    Ran, LX
    Wang, YM
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2000, 9 (01) : 29 - 32
  • [8] Security Analysis of the RBS Block Cipher
    Mala, Hamid
    Adavoudi, AmirHosein
    Aghili, Seyed Farhad
    [J]. 2016 24TH IRANIAN CONFERENCE ON ELECTRICAL ENGINEERING (ICEE), 2016, : 130 - 132
  • [9] Security Analysis of Block Cipher CFE
    Du Xiaoni
    Duan Ee
    Wang Tianxin
    [J]. JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2021, 43 (05) : 1365 - 1371
  • [10] Security Enhancement of Blowfish Block Cipher
    Patel, Rajan
    Kamboj, Pariza
    [J]. SMART TRENDS IN INFORMATION TECHNOLOGY AND COMPUTER COMMUNICATIONS, SMARTCOM 2016, 2016, 628 : 231 - 238